Detection of cryptographic algorithms with grap
نویسندگان
چکیده
The disassembled code of an executable program can be seen as a graph representing the possible sequence of instructions (Control Flow Graph). grap is a YARA-like tool, completely open-source, and able to detect graph patterns, defined by the analyst, within an executable program. We used grap to detect cryptographic algorithms: we created patterns for AES and ChaCha20 that are based on parts of the assembly code produced by compiling popular implementations (available in LibreSSL and libsodium). Our approach is thus based on the algorithms and their structure and does not rely on constant detection. Identifying cryptographic algorithms used by an executable has multiple applications. It can be used to detect features implemented within the binary (“this program uses AES”, “this binary can verify cryptographic signatures”). Within a platform performing automated analysis one aim can be to extract cryptographic material (the AES key used, a non-standard S-Box). Finally, integrated with existing tools (IDA plugin) it can help a reverse-engineer focus on found areas (“this subroutine looks like a cryptographic function”) or avoid wasting time on known algorithms (“this function implements ChaCha20”). We used grap [TT17a; TT17b] to create detection patterns that are based on the control flow graph of the binaries in order to focus on instruction and flow matching and offer an alternative to constant detection. The paper is organized as follows. First there is an overview of grap with simple examples and a dive into its capabilities and the matching algorithm. Then we explain how we created patterns for AES and ChaCha20, and give insights on advantages and disadvantages of a detection based on CFG matching.
منابع مشابه
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملImproving TCP performance in TDMA-based satellite access networks
In TDMA-based MAC (media access control) protocols for satellite network access, slotted ALOHA which has been widely deployed in Very Small Aperture Terminal (VSAT) systems. More recently, Generalized Retransmission Announcement Protocol (GRAP) was proposed in [5], which regroups the immediate access by contention at low loads and the reservation access at higher loads to achieve a better effic...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملSecurity of Sponge structures
Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...
متن کاملA Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders
Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017